{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T11:25:37Z","timestamp":1648898737103},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[1990,9,1]],"date-time":"1990-09-01T00:00:00Z","timestamp":652147200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Queueing Syst"],"published-print":{"date-parts":[[1990,9]]},"DOI":"10.1007\/bf01154548","type":"journal-article","created":{"date-parts":[[2005,3,25]],"date-time":"2005-03-25T07:54:55Z","timestamp":1111737295000},"page":"307-324","source":"Crossref","is-referenced-by-count":1,"title":["Performance analysis of test scheduling schemes for a multi-access communications network"],"prefix":"10.1007","volume":"7","author":[{"given":"Izhak","family":"Rubin","sequence":"first","affiliation":[]},{"given":"Zhensheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"67","key":"CR1","first-page":"67","volume":"15","author":"F. Baccelli","year":"1981","unstructured":"F. Baccelli, Analysis of a service facility with periodic checkpointing, Acta Informatica 15, 67 (1981) 67?81.","journal-title":"Acta Informatica"},{"key":"CR2","first-page":"1293","volume":"60","author":"H.O. Burton","year":"1972","unstructured":"H.O. Burton and D.D. Sullivan, Errors and error control,Proc. IEEE, Special Issue on Computer Communication, vol. 60 (1972) pp. 1293?1301.","journal-title":"Proc. IEEE, Special Issue on Computer Communication"},{"issue":"5","key":"CR3","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/C-M.1975.218955","volume":"8","author":"K.M. Chandy","year":"1975","unstructured":"K.M. Chandy, A survey of analytic models of rollback recovery strategies, Comput. 8 (5) (1975) 40?47.","journal-title":"Comput"},{"key":"CR4","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/TSE.1975.6312824","volume":"1","author":"K.M. Chandy","year":"1975","unstructured":"K.M. Chandy, J.C. Browne, C.W. Dissly and W.R. Uhrig, Analytical models for rollback recovery strategies in data base systems, IEEE Trans. Software Eng. 1 (1975) 100?110.","journal-title":"IEEE Trans. Software Eng."},{"key":"CR5","first-page":"179","volume":"6","author":"A.G. Gatfield","year":"1976","unstructured":"A.G. Gatfield, Error control on satellite channels using ARQ techniques, COMSAT Tech. Rev. 6 (1976) 179?188.","journal-title":"COMSAT Tech. Rev."},{"key":"CR6","first-page":"251","volume-title":"Proc. 2nd Int. Symp. of Software Engineering","author":"E. Gelenbe","year":"1976","unstructured":"E. Gelenbe, On rollback recovery with multiple checkpoints,Proc. 2nd Int. Symp. of Software Engineering, IEEE, San Francisco (1976) pp. 251?255."},{"key":"CR7","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/322123.322131","volume":"26","author":"E. Gelenbe","year":"1979","unstructured":"E. Gelenbe, On the optimum checkpoint interval, J. ACM 26 (1979) 259?270.","journal-title":"J. ACM"},{"issue":"6","key":"CR8","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1145\/359511.359531","volume":"21","author":"E. Gelenbe","year":"1978","unstructured":"E. Gelenbe and D. Derochette, Performance of rollback recovery systems under intermittent failures, Commun. ACM 21 (6) (1978) 493?499.","journal-title":"Commun. ACM"},{"key":"CR9","unstructured":"J. O'Rourk and J. Zatz, Surveillance maintenance operations strategy for ISDN basic access lines,Proc. IEEE Network Operations and Management Symp. (NOMS'88), New Orleans, LA, Session 15 (Feb. 1988)."},{"key":"CR10","first-page":"1152","volume":"COM-30","author":"B. Saeki","year":"1982","unstructured":"B. Saeki and I. Rubin, An analysis of a TDMA channel using stop-and-wait, block, and select-and-repeat ARQ error control, IEEE Trans. Commun. COM-30 (1982) 1152?1173.","journal-title":"IEEE Trans. Commun."},{"key":"CR11","unstructured":"I. Rubin and Z. Zhang, Message delay analysis for TDMA scheme using contiguous-slot assignments,ICC'88, Philadelphia (June, 1988) Sec. 12?1."},{"key":"CR12","unstructured":"L. Tak\u00e1cs,Introduction to the Theory of Queues (Oxford University Press, 1962)."},{"key":"CR13","unstructured":"D. Towsley, The waiting time distribution for statistical multiplexers with ARQ retransmission schemes,Proc. Int. Conf. Communications (1978) sec. 3.6.1?3.6.4."},{"key":"CR14","unstructured":"D. Towsley and J.K. Wolf, On the statistical analysis of concentrators with ARQ retransmission schemes,Proc. 15th Allerton Conf. (1977) pp. 709?717."},{"issue":"1","key":"CR15","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/BF01069528","volume":"24","author":"I.S. Mikadze","year":"1988","unstructured":"I.S. Mikadze, A queueing system with an unreliable server and periodic checking, Cybernetics 24 (1) (1988) 68?75.","journal-title":"Cybernetics"},{"issue":"4","key":"CR16","first-page":"1078","volume":"14","author":"R.E. Barlow","year":"1963","unstructured":"R.E. Barlow, L.C. Hunter and F. Proschan, Optimal checking procedures, J. SIAM 14 (4) (1963) 1078?1095.","journal-title":"J. SIAM"},{"key":"CR17","unstructured":"D. Brender, A surveillance model for recurrent events, IBM Research Report, RC-837 (1962)."},{"issue":"9","key":"CR18","doi-asserted-by":"crossref","first-page":"1102","DOI":"10.1287\/mnsc.29.9.1102","volume":"29","author":"H. Luss","year":"1983","unstructured":"H. Luss, An inspection policy model for production facilities, Management Sci. 29 (9) (1983) 1102?1109.","journal-title":"Management Sci."}],"container-title":["Queueing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01154548.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01154548\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01154548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T12:13:53Z","timestamp":1556626433000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01154548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,9]]},"references-count":18,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[1990,9]]}},"alternative-id":["BF01154548"],"URL":"https:\/\/doi.org\/10.1007\/bf01154548","relation":{},"ISSN":["0257-0130","1572-9443"],"issn-type":[{"value":"0257-0130","type":"print"},{"value":"1572-9443","type":"electronic"}],"subject":[],"published":{"date-parts":[[1990,9]]}}}